The growth of information technologies stimulated the rapid development and effective use of information networks in the entrepreneurial activity and in everyday life, and the growth of new threats. Education and training are essential to creating a culture of security in the workplace. The main idea is that all employees in an organization must be involved in security policy and must be aware of the tactics, techniques, and procedures needed to protect the internal system (Tripwire guest authors, 2014).
The problem in the fight against crime on the Internet is the international character of cyber criminality and the absence of mechanisms necessary to control this issue that enables modern technology to protect Americans from international cyber criminals. The reality suggests that technology cannot protect Americans from international cyber criminals. The U.S. does not have a special national strategy focused on combating cyber crime. There are broad strategies focused on cybercrime components, but policy makers are not still sure whether there should be a separate strategy for combating cybercrime. There is the National Strategy to Secure Cyberspace that prioritizes improving U.S. response to cyber incidents and preventing cyber attacks, but it doesn’t establish the aim to use modern technologies to protect Americans from international cyber criminals. (Finklea, Theohary, 2016) The next issue is that new technologies arise every day and it is almost impossible to predict methods and instruments of cyber criminals and effectively stop the achievement of criminal purposes, such as committing fraud, trafficking in child pornography and intellectual property, stealing personal data, or breach of confidentiality, financial crime, trafficking in smuggled goods, illegal downloading of files, etc.
References
Finklea, K., and Theohary, C. (2016). Cybercrime: Conceptual Issues for Congress and U.S.
Law Enforcement. Congressional Research Service. Web. 27 Apr. 2016.
Tripwire guest authors. (2014). Preventing and Recovering from Cybercrime. The state of
security. Web. 27 Apr. 2016.